Vol.18 n°6 may 1993

Vol.18 n°6 may 1993

p.4 Contents

p.4 Contents

p.8 Inside BYTE : BYTE Topic Index

p.8 Inside BYTE : BYTE Topic Index

COVER STORY

p.92 Intel Launches Rocket in a Socket

p.92 Intel Launches Rocket in a Socket

[theme : FEATURE]

NEWS

p.24 MICROBYTES

p.24 MICROBYTES

Bringing Unix into the NetWare fold presents Novell with a marketing dilemma: what to tell software developers who ask which platform to write applications for.

p.33 AutoCAD Draws on Windows

p.33 AutoCAD Draws on Windows

Autodesk's best-selling CAD software goes Windows.

[theme : FIRST IMPRESSIONS] [author : Patrick Waurzyniak]

p.37 A Heavy-Hitting Unix for PCs

p.37 A Heavy-Hitting Unix for PCs

Solaris for Intel is the most complete PC Unix.

[author : Ben Smith]

p.42 NetWare 4.0,

p.42 NetWare 4.0,

the next step for a growing network

NoteJet 486, Canon's notebook/printer makes a dynamic package

HP LaserJet 4Si and 4Si MX, Hewlett-Packard's newest network printers

PagePlus 2.0, a $59.95 desktop publishing package

Compel, multimedia presentation software from Asymetrix

Painter 2.0, a "natural," professional, and fun paint tool

p.57 WHAT'S NEW

p.57 WHAT'S NEW

The DTR-1 is a notebook or a pen computer, the SmartLink V32bis FaxModem encrypts your data, LapCAD 5 for the Mac gives you finite modeling, and more.

FEATURES

p.92 Intel Launches Rocket in a Socket

p.92 Intel Launches Rocket in a Socket

Intel's new Pentium CPU doubles the speed of the fastest 486.

[author : Tom R. Halfhill]

p.111 Oberon: A Glimpse at the Future

p.111 Oberon: A Glimpse at the Future

A radically object-oriented design previews future operating systems.

[author : Dick Pountain]

STATE OF THE ART

[theme : SEEKING SECURITY]

p.118 Overview: Seeking Security

p.118 Overview: Seeking Security

Mainframe-type security is coming to the client/server environment.

[author : Paulina Borsook]

p.129 Should Encryption Be Regulated?

p.129 Should Encryption Be Regulated?

U.S. law enforcers want to limit your use of data encryption.

[author : Peter Wagner]

p.137 Stealth Virus Attacks

p.137 Stealth Virus Attacks

Anonymous attack software targets networked computers.

[author : John DeHaven]

p.144 Resource Guide: Virus Protection for Networks

p.144 Resource Guide: Virus Protection for Networks

REVIEWS

p.146 Hands-On Testing 126 PRINTERS

p.146 Hands-On Testing 126 PRINTERS

Our testing shows which printer is best for your needs.

[theme : LAB REPORT] [author : Richard Fox, Alan Jock, Chandrika Krishnanturthy, Stephen Platt, and Leonard Presberg]

p.176 Making the MPC Upgrade

p.176 Making the MPC Upgrade

Some of the best options available for bringing multimedia to the PC.

[theme : SOLUTIONS FOCUS] [author : Greg Loveria]

p.194 Personable PIMs

p.194 Personable PIMs

Ten PIMs for Windows, DOS, and the Mac, ranging from simple organizers to full-blown project managers.

[author : Nicholas Baran]

p.199 Banyan's "StreetTalk for NetWare"

p.199 Banyan's "StreetTalk for NetWare"

Banyan's distributed directory meets server-based NetWare.

[author : John Rydberg]

p.201 Windows Video Recorders

p.201 Windows Video Recorders

The hardware side of Video for Windows.

[author : Tom Yager]

p.205 Tape Backup on the Go

p.205 Tape Backup on the Go

[author : Howard Eglowstein]

A review of four parallel-port tape drives for backup.

p.209 Lotus 1-2-3 Release 3.4 for DOS

p.209 Lotus 1-2-3 Release 3.4 for DOS

Lotus' latest high-end DOS spreadsheet is faster, but you mill may prefer the low-end line.

[author : Nicholas John Delonas]

HANDS ON

p.213 Computing on Wheels

p.213 Computing on Wheels

This month's column literally goes under the hood to examine a new generation of automotive-control computers.

[theme : UNDER THE HOOD] [author : Dick Pountain]

p.221 The Power of Inheritance

p.221 The Power of Inheritance

How to take advantage of multiple inheritance in your C++ class designs.

[theme : SOME ASSEMBLY REQUIRED] [author : Allen Holub]

p.229 Getting a Handle on NT

p.229 Getting a Handle on NT

Windows NT offers outstanding exception-handling tools. Here's why you need them.

[theme : BEYOND DOS] [author : Gen Kiyooka]

OPINIONS

p.75 Once More into the Breach

p.75 Once More into the Breach

[theme : USER'S COLUMN] [author : Jerry Pournelle]

User's Choice Awards wrap-up.

p.210 BOOK AND CD-ROM REVIEWS From the Mind of MIT

p.210 BOOK AND CD-ROM REVIEWS From the Mind of MIT

Windows NT, multimedia, MIT, Compton's on CD-ROM, and more.

[author : Hugh Kenner, Steve Apiki, and Tom Yager]

p.282 STOP BIT Losing the Human Edge

p.282 STOP BIT Losing the Human Edge

Computers are about to mount a new challenge in the chess world.

[author : Hans Berliner]

p.12 EDITORIAL Our New Lab Report: Your New Consultant

p.12 EDITORIAL Our New Lab Report: Your New Consultant

[author : Dennis Allen]

p.20 LETTERS

p.20 LETTERS

Coming to terms with software gluttony; OS/2 hassles; machine translation; and other topics.

READER SERVICE

p.280 Editorial to Company

p.280 Editorial to Company

p.276 Alphabetical Index to Advenisers

p.276 Alphabetical Index to Advenisers

p.278 Index In Advertisers by Product Category

p.278 Index In Advertisers by Product Category

Inquiry Reply Cards: 276A

p.233 BUYER'S GUIDE

p.233 BUYER'S GUIDE

Mail Order

Hardware/Software Showcase

Buyer's Mart

PROGRAM LISTINGS

From BIX: Join "listings/frombyte93" and select the appropriate subarea (i.e., "may93").

From the UUNET: ftp to ftp.uu.net, log on as "anonymous," and enter your user ID as your password. Type "cd/published/byte" and type "DIR." Files appear in subdirectories arranged by month.

From the BYTE BBS at 1200-9600 bps: Dial (603) 924-9820 and follow the instructions at the prompt.